As the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues.
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S.
An online retail site at University of Connecticut is warning thousands of customers that their billing information may have been hacked.
Recent data breaches at two banks underscore what's becoming a gnarly problem for companies that handle sensitive information: When does a hacked PC become a data breach?
South Korea has concluded that Google illegally collected personal data while collecting information for its Street View map service, an official at the country's National Police Agency (NPA) said on Thursday.
We were wrong -- so far -- that Carol Bartz would be ousted as Yahoo CEO by the end of this year, but we were right that Apple's tablet, whose name wasn't known at the end of last year, would be huge. OK, so that second one was probably a given, but ...
If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't.
Laptops can be stolen. Neoflyer asked the PCWorld.com Answer Line forum for tips on protecting them.
People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers.
E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if t...
The activists behind Operation Payback have come up with a new way to annoy corporations that have severed their ties with WikiLeaks: bombard them with faxes.
As the distributed denial-of-service attacks spawned by this week's WikiLeaks events continue, network operators are discussing what progress, if any, has been made over the past decade to detect and thwart DoS attacks.
Dutch authorities arrested a 16-year-old boy on Wednesday in relation to the cyberattacks against Visa, MasterCard and PayPal, which were aimed at punishing those companies for cutting off services to WikiLeaks.
Hackers broke into the state of Iowa's Amber Alert website and issued a bogus alert over the weekend.
Certain Web sites probe visiting browsers for data that can be used to help criminals craft phishing attacks that compromise the accounts of online banking customers, researchers have found.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Huawei Nova Plus smartphone review
- 3 Apple iPhone 7 Plus review: including Portrait Mode
- 4 Google Daydream View VR full, in-depth review
- 5 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
Join the PC World newsletter!
Latest News Articles
- Lavabit developer has a new encrypted, end-to-end email protocol
- Apple sues Qualcomm over patent licensing and $1B in payments
- New details emerge about Intel's super-small Euclid computer for robots
- Microsoft will soon end Office 2013 distribution through Office 365
- Researchers propose a way to use your heartbeat as a password
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Time to ditch Foxtel and the iQ3: How to replace Foxtel packages with cheaper alternatives
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTBrand Marketing Manager - Premium Entertainment BrandNSW
- FTSenior .Net DeveloperVIC
- CCTelco Program ManagerVIC
- TPProgram ManagerNSW
- CCSenior Business AnalystNSW
- FTSAP BW ConsultantACT
- TPAnsarada Data Room AdministratorNSW
- CCJunior BI / Data Analytics Analyst - contract - SydneyNSW
- TPProjects Planning ManagerQLD
- TPDigital Business AnalystNSW
- FTTechnical Business AnalystVIC
- CCNetwork Systems Engineer l Application Support l Linux l Port MacquarieNSW
- FTIT Procurement AdvisorQLD
- FTTechnology Testing CoordinatorQLD
- CCDeployment LeadVIC
- FTJunior Business Process Analyst Perm North SydneyNSW
- FTSenior System AdministratorVIC
- FTDatacentre Solution ArchitectVIC
- TPSenior Business Analyst - Travel and Expense Management SystemQLD
- TPService Desk AnalystVIC
- CCJunior Business AnalystNSW
- FTMid Level Infrastructure Project ManagerVIC
- TPAndroid DeveloperSA
- CCTechnical Business Analyst-DevOpsNSW